BIOT Security Considerations
- The BIOT was designed to send information rather than receive commands to control objects. For this reason, there is no possibility that a hacker could do any damage to the home or office environment through a BIOT
- As for information that is uploaded to the wider internet, BIOT contains neither microphones nor cameras, ensuring that the user's privacy is not compromised in these key areas.
- The configuration process relies on an individualized WPA password unique to each BIOT when the user's own AP WiFi password is submitted, which ensures against the possibility of wireless snooping that could otherwise compromise the user's normal WiFi network.
- All data is sent wirelessly to the user's own WiFi AP through WPA encrypted packets, and does not route through any of the user's other devices including smartphones, laptops, or desktop computers.
- The only type of data sent that could be considered a risk if it were intercepted would be the door open/close feature, however there is no way for a hypothetical hacker to distinguish between whether people are entering or exiting the home or office. In addition, the regular updates of the BIOT mimic activity that looks as though the user is at home / the office is in service, so in the very unlikely event that a hacker were to gain access to an Internet-Service-Provider's core routers, that hacker would have no useful information by which to gauge presence or absence of normal activity.